- Issued:
- 2020-04-02
- Updated:
- 2020-04-02
RHBA-2020:1297 - Bug Fix Advisory
Synopsis
Red Hat OpenStack Platform 13.0 director bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated director installer packages that resolve various issues are now
available for Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
Changes to the openstack-tripleo-heat-templates component:
- Before this update, when upgrading Red Hat OpenStack Platform (RHOSP) 13 on 64-bit PowerPC processors to the latest maintenance release, Paunch would fail to create the `nova_libvirt` container, report the following error, and cause the upgrade to fail:
/usr/bin/docker-current: Error response from daemon:
Requested CPUs are not available….
The value of the RHOSP parameter, `cpuset_cpus`, in nova-libvirt.yaml defaults to all CPUs. In cases where the simultaneous multithreading (SMT) control was disabled, the CPUs were exposed differently and the RHOSP upgrade was failing.
Two changes have been made to resolve this issue. First, by default, Docker automatically determines for you which CPUs are available. The second change is that you can use a new role-based parameter, `ContainerCpusetCpus` to override Docker. For more information, see https://access.redhat.com/solutions/4917021. (BZ#1813091)
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 13 runs on Red Hat Enterprise Linux 7.7.
The Red Hat OpenStack Platform 13 Release Notes contain the following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat OpenStack Platform 13, including which
channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/13/html/release_notes/
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack for IBM Power 13 ppc64le
- Red Hat OpenStack 13 x86_64
- Red Hat OpenStack Director Deployment Tools 13 x86_64
- Red Hat OpenStack Director Deployment Tools for IBM Power LE 13 ppc64le
Fixes
- BZ - 1813091 - z11 update fails on PPC64LE compute node due to "cpuset_cpus: all"
- BZ - 1813758 - 13z11 (March 10 2020) update breaks neutron_* healthchecks
CVEs
(none)
References
(none)
Red Hat OpenStack for IBM Power 13
| SRPM | |
|---|---|
| openstack-tripleo-common-8.7.1-15.el7ost.src.rpm | SHA-256: 35eb9c09d74721435323faf5a9e478bcc3edc701a0e2d2b79b503edd6ab9946e |
| openstack-tripleo-heat-templates-8.4.1-51.el7ost.src.rpm | SHA-256: cf8acb9d74fb3cabec9ecad869fbd920d82248d32b4239b5332eb6c317b821fc |
| python-paunch-2.5.3-3.el7ost.src.rpm | SHA-256: d43e0c4d5b095d52e0c929028077470f03b7076d946bd6fe7a5265c16d564684 |
| ppc64le | |
| openstack-tripleo-common-8.7.1-15.el7ost.noarch.rpm | SHA-256: cec8bcdc324dff01f5ffe1647eff85db809895f2e66e9335e2c113fe32a15f0e |
| openstack-tripleo-common-container-base-8.7.1-15.el7ost.noarch.rpm | SHA-256: fe6da3fdce8c17be3f760b7a530cd4e7f858fceee9ee51ba9a6e2c474a3b96b4 |
| openstack-tripleo-common-containers-8.7.1-15.el7ost.noarch.rpm | SHA-256: e3b6db0e9aebafac2bdc60fbb73a83eb66077144ef997f49f7223dc3c545782f |
| openstack-tripleo-common-devtools-8.7.1-15.el7ost.noarch.rpm | SHA-256: ce2b8b4c71e52197e61b11720b098428f2df27ad8ef9181ea8556b8c71c8f5e6 |
| openstack-tripleo-heat-templates-8.4.1-51.el7ost.noarch.rpm | SHA-256: faac2836600dfa13009c17adbb975ce75a9bd931f7aa1dce0e1f450321f4deff |
| python-paunch-2.5.3-3.el7ost.noarch.rpm | SHA-256: 20be32c94a61955e302f8fdc34422db7c9a92c476ab3c041118492cf505963f8 |
Red Hat OpenStack 13
| SRPM | |
|---|---|
| openstack-tripleo-common-8.7.1-15.el7ost.src.rpm | SHA-256: 35eb9c09d74721435323faf5a9e478bcc3edc701a0e2d2b79b503edd6ab9946e |
| openstack-tripleo-heat-templates-8.4.1-51.el7ost.src.rpm | SHA-256: cf8acb9d74fb3cabec9ecad869fbd920d82248d32b4239b5332eb6c317b821fc |
| python-paunch-2.5.3-3.el7ost.src.rpm | SHA-256: d43e0c4d5b095d52e0c929028077470f03b7076d946bd6fe7a5265c16d564684 |
| x86_64 | |
| openstack-tripleo-common-8.7.1-15.el7ost.noarch.rpm | SHA-256: cec8bcdc324dff01f5ffe1647eff85db809895f2e66e9335e2c113fe32a15f0e |
| openstack-tripleo-common-container-base-8.7.1-15.el7ost.noarch.rpm | SHA-256: fe6da3fdce8c17be3f760b7a530cd4e7f858fceee9ee51ba9a6e2c474a3b96b4 |
| openstack-tripleo-common-containers-8.7.1-15.el7ost.noarch.rpm | SHA-256: e3b6db0e9aebafac2bdc60fbb73a83eb66077144ef997f49f7223dc3c545782f |
| openstack-tripleo-common-devtools-8.7.1-15.el7ost.noarch.rpm | SHA-256: ce2b8b4c71e52197e61b11720b098428f2df27ad8ef9181ea8556b8c71c8f5e6 |
| openstack-tripleo-heat-templates-8.4.1-51.el7ost.noarch.rpm | SHA-256: faac2836600dfa13009c17adbb975ce75a9bd931f7aa1dce0e1f450321f4deff |
| python-paunch-2.5.3-3.el7ost.noarch.rpm | SHA-256: 20be32c94a61955e302f8fdc34422db7c9a92c476ab3c041118492cf505963f8 |
Red Hat OpenStack Director Deployment Tools 13
| SRPM | |
|---|---|
| python-paunch-2.5.3-3.el7ost.src.rpm | SHA-256: d43e0c4d5b095d52e0c929028077470f03b7076d946bd6fe7a5265c16d564684 |
| x86_64 | |
| python-paunch-2.5.3-3.el7ost.noarch.rpm | SHA-256: 20be32c94a61955e302f8fdc34422db7c9a92c476ab3c041118492cf505963f8 |
Red Hat OpenStack Director Deployment Tools for IBM Power LE 13
| SRPM | |
|---|---|
| python-paunch-2.5.3-3.el7ost.src.rpm | SHA-256: d43e0c4d5b095d52e0c929028077470f03b7076d946bd6fe7a5265c16d564684 |
| ppc64le | |
| python-paunch-2.5.3-3.el7ost.noarch.rpm | SHA-256: 20be32c94a61955e302f8fdc34422db7c9a92c476ab3c041118492cf505963f8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.